Access Control And Privacy Preserving Mechanisms On Sensitive Data

2016 
The privacy preserving module anonymizes the data to convene privacy requirements and sketchiness constraints on predicates set by the access control device. We make this communication as the problem of k-anonymous. Role-based Access Control (RBAC) agrees to significant permissions on objects based on roles in an organization. An RBAC policy configuration is composed of a set of Users(U), a set of Roles (R), and a set of Permissions (P). The access control policies explain selection predicates accessible to roles at the same time as the privacy compulsion is to please the k-anonymity orl-diversity.
    • Correction
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []